Stealing the network: how to own a continent
This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This boo...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
© 2004
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised |
Beschreibung: | Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc." Includes bibliographical references |
Beschreibung: | 1 online resource |
ISBN: | 193226678X 9781932266788 9781931836050 1931836051 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124530 | ||
003 | DE-604 | ||
005 | 20190906 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2004 |||| o||u| ||||||eng d | ||
020 | |a 193226678X |9 1-932266-78-X | ||
020 | |a 9781932266788 |9 978-1-932266-78-8 | ||
020 | |a 9781931836050 |9 978-1-931836-05-0 | ||
020 | |a 1931836051 |9 1-931836-05-1 | ||
035 | |a (ZDB-33-ESD)ocm55629598 | ||
035 | |a (OCoLC)55629598 | ||
035 | |a (DE-599)BVBBV046124530 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 813.08762 |2 22 | |
245 | 1 | 0 | |a Stealing the network |b how to own a continent |c Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer ; 131ah [and others] ; |
264 | 1 | |a Rockland, MA |b Syngress |c © 2004 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc." | ||
500 | |a Includes bibliographical references | ||
520 | |a This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world | ||
520 | |a Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised | ||
650 | 7 | |a FICTION / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Hackers |2 fast | |
650 | 4 | |a Computer security |v Fiction | |
650 | 4 | |a Hackers |v Fiction | |
650 | 4 | |a Cyberterrorism |v Fiction | |
700 | 1 | |a Russell, Ryan |d 1969- |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781931836050 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504984 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781931836050 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442642907136 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV046124530 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm55629598 (OCoLC)55629598 (DE-599)BVBBV046124530 |
dewey-full | 813.08762 |
dewey-hundreds | 800 - Literature (Belles-lettres) and rhetoric |
dewey-ones | 813 - American fiction in English |
dewey-raw | 813.08762 |
dewey-search | 813.08762 |
dewey-sort | 3813.08762 |
dewey-tens | 810 - American literature in English |
discipline | Anglistik / Amerikanistik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02740nmm a2200469zc 4500</leader><controlfield tag="001">BV046124530</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190906 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">193226678X</subfield><subfield code="9">1-932266-78-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266788</subfield><subfield code="9">978-1-932266-78-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836050</subfield><subfield code="9">978-1-931836-05-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836051</subfield><subfield code="9">1-931836-05-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm55629598</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)55629598</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124530</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">813.08762</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Stealing the network</subfield><subfield code="b">how to own a continent</subfield><subfield code="c">Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer ; 131ah [and others] ;</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">FICTION / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Russell, Ryan</subfield><subfield code="d">1969-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781931836050</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504984</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781931836050</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124530 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 193226678X 9781932266788 9781931836050 1931836051 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504984 |
oclc_num | 55629598 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress |
record_format | marc |
spelling | Stealing the network how to own a continent Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer ; 131ah [and others] ; Rockland, MA Syngress © 2004 1 online resource txt rdacontent c rdamedia cr rdacarrier Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc." Includes bibliographical references This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised FICTION / General bisacsh Computer security fast Cyberterrorism fast Hackers fast Computer security Fiction Hackers Fiction Cyberterrorism Fiction Russell, Ryan 1969- Sonstige oth http://www.sciencedirect.com/science/book/9781931836050 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Stealing the network how to own a continent FICTION / General bisacsh Computer security fast Cyberterrorism fast Hackers fast Computer security Fiction Hackers Fiction Cyberterrorism Fiction |
title | Stealing the network how to own a continent |
title_auth | Stealing the network how to own a continent |
title_exact_search | Stealing the network how to own a continent |
title_full | Stealing the network how to own a continent Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer ; 131ah [and others] ; |
title_fullStr | Stealing the network how to own a continent Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer ; 131ah [and others] ; |
title_full_unstemmed | Stealing the network how to own a continent Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer ; 131ah [and others] ; |
title_short | Stealing the network |
title_sort | stealing the network how to own a continent |
title_sub | how to own a continent |
topic | FICTION / General bisacsh Computer security fast Cyberterrorism fast Hackers fast Computer security Fiction Hackers Fiction Cyberterrorism Fiction |
topic_facet | FICTION / General Computer security Cyberterrorism Hackers Computer security Fiction Hackers Fiction Cyberterrorism Fiction |
url | http://www.sciencedirect.com/science/book/9781931836050 |
work_keys_str_mv | AT russellryan stealingthenetworkhowtoownacontinent |